Access authentication method for wireless mesh network
A wireless mesh network and wireless mesh network technology, applied in wireless communication, user identity/authority verification, security devices, etc., can solve problems such as two-way authentication MKD logic conflicts, avoid link establishment failures, and ensure security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0031] In a specific embodiment, the second mesh network node detects the reception of the surrounding mesh network node by receiving the beacon frame of the surrounding mesh network node, or the second mesh network node sends a probe request frame Signal Strength (Received Signal Strength, RSS), so as to discover the first mesh network node that has passed the authentication, and send a first access authentication request message to the first mesh network node with the first mesh network node as the authenticator.
[0032]S12. After receiving the first access authentication request message, the first mesh network node uses a private key to encrypt the certificate of the first mesh network node and the first access authentication request message together to generate a first certificate Authentication request message, and sent to the authentication server;
[0033] S13. After receiving the first certificate authentication request message, the authentication server uses the publ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com